Cybersecurity Awareness Month 2025: Knowledge is power
We’re kicking off the month with a focus on the human element: the first line of defense, but also the path of least resistance for…
We’re kicking off the month with a focus on the human element: the first line of defense, but also the path of least resistance for…
A critical remote code execution vulnerability affecting XWiki’s SolrSearch component has become the target of widespread exploitation attempts, prompting cybersecurity authorities to add it to…
Microsoft is rolling out a significant security enhancement for its Authenticator app starting February 2026, introducing jailbreak and root detection capabilities that will automatically wipe…
Streaming service Sling TV has settled with the California Attorney General over allegations that it blocked users from exercising their privacy rights. The company will…
Nov 04, 2025Ravie LakshmananRansomware / Cybercrime Federal prosecutors in the U.S. have accused a trio of allegedly hacking the networks of five U.S. companies with…
Manufacturers operate in one of the most unforgiving threat environments and face a unique set of pressures that make attacks particularly damaging 03 Oct 2025…
Threat actors are targeting a critical vulnerability in the JobMonster WordPress theme that allows hijacking of administrator accounts under certain conditions. The malicious activity was…
The cybersecurity threat landscape shifted dramatically on October 30, 2025, when security researchers monitoring honeypot infrastructure detected a significantly evolved variant of the RondoDox botnet.…
Nov 04, 2025Ravie LakshmananArtificial Intelligence / Vulnerability Google’s artificial intelligence (AI)-powered cybersecurity agent called Big Sleep has been credited by Apple for discovering as many…
Crooks exploit RMM software to hijack trucking firms and steal cargo Pierluigi Paganini November 04, 2025 Hackers target trucking firms with RMM tools to steal…
Looks can be deceiving, so much so that the familiar icon could mask malware designed to steal your data and money. 06 Oct 2025 • …
An ongoing malicious advertising campaign is weaponizing legitimate software downloads to deploy OysterLoader malware, previously identified as Broomstick and CleanUpLoader. This sophisticated initial access tool…